Introces the capability to set bucket quota on bucket creation and adds the API to set the bucket on it's own
1169 lines
62 KiB
Go
1169 lines
62 KiB
Go
// Code generated by go-swagger; DO NOT EDIT.
|
|
|
|
// This file is part of MinIO Console Server
|
|
// Copyright (c) 2020 MinIO, Inc.
|
|
//
|
|
// This program is free software: you can redistribute it and/or modify
|
|
// it under the terms of the GNU Affero General Public License as published by
|
|
// the Free Software Foundation, either version 3 of the License, or
|
|
// (at your option) any later version.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU Affero General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU Affero General Public License
|
|
// along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
//
|
|
|
|
package operations
|
|
|
|
// This file was generated by the swagger tool.
|
|
// Editing this file might prove futile when you re-run the swagger generate command
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
"strings"
|
|
|
|
"github.com/go-openapi/errors"
|
|
"github.com/go-openapi/loads"
|
|
"github.com/go-openapi/runtime"
|
|
"github.com/go-openapi/runtime/middleware"
|
|
"github.com/go-openapi/runtime/security"
|
|
"github.com/go-openapi/spec"
|
|
"github.com/go-openapi/strfmt"
|
|
"github.com/go-openapi/swag"
|
|
|
|
"github.com/minio/console/models"
|
|
"github.com/minio/console/restapi/operations/admin_api"
|
|
"github.com/minio/console/restapi/operations/user_api"
|
|
)
|
|
|
|
// NewConsoleAPI creates a new Console instance
|
|
func NewConsoleAPI(spec *loads.Document) *ConsoleAPI {
|
|
return &ConsoleAPI{
|
|
handlers: make(map[string]map[string]http.Handler),
|
|
formats: strfmt.Default,
|
|
defaultConsumes: "application/json",
|
|
defaultProduces: "application/json",
|
|
customConsumers: make(map[string]runtime.Consumer),
|
|
customProducers: make(map[string]runtime.Producer),
|
|
PreServerShutdown: func() {},
|
|
ServerShutdown: func() {},
|
|
spec: spec,
|
|
ServeError: errors.ServeError,
|
|
BasicAuthenticator: security.BasicAuth,
|
|
APIKeyAuthenticator: security.APIKeyAuth,
|
|
BearerAuthenticator: security.BearerAuth,
|
|
|
|
JSONConsumer: runtime.JSONConsumer(),
|
|
|
|
BinProducer: runtime.ByteStreamProducer(),
|
|
JSONProducer: runtime.JSONProducer(),
|
|
|
|
UserAPIAddBucketReplicationHandler: user_api.AddBucketReplicationHandlerFunc(func(params user_api.AddBucketReplicationParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.AddBucketReplication has not yet been implemented")
|
|
}),
|
|
AdminAPIAddGroupHandler: admin_api.AddGroupHandlerFunc(func(params admin_api.AddGroupParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.AddGroup has not yet been implemented")
|
|
}),
|
|
AdminAPIAddNotificationEndpointHandler: admin_api.AddNotificationEndpointHandlerFunc(func(params admin_api.AddNotificationEndpointParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.AddNotificationEndpoint has not yet been implemented")
|
|
}),
|
|
AdminAPIAddPolicyHandler: admin_api.AddPolicyHandlerFunc(func(params admin_api.AddPolicyParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.AddPolicy has not yet been implemented")
|
|
}),
|
|
UserAPIAddRemoteBucketHandler: user_api.AddRemoteBucketHandlerFunc(func(params user_api.AddRemoteBucketParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.AddRemoteBucket has not yet been implemented")
|
|
}),
|
|
AdminAPIAddUserHandler: admin_api.AddUserHandlerFunc(func(params admin_api.AddUserParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.AddUser has not yet been implemented")
|
|
}),
|
|
AdminAPIAdminInfoHandler: admin_api.AdminInfoHandlerFunc(func(params admin_api.AdminInfoParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.AdminInfo has not yet been implemented")
|
|
}),
|
|
AdminAPIArnListHandler: admin_api.ArnListHandlerFunc(func(params admin_api.ArnListParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ArnList has not yet been implemented")
|
|
}),
|
|
UserAPIBucketInfoHandler: user_api.BucketInfoHandlerFunc(func(params user_api.BucketInfoParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.BucketInfo has not yet been implemented")
|
|
}),
|
|
UserAPIBucketSetPolicyHandler: user_api.BucketSetPolicyHandlerFunc(func(params user_api.BucketSetPolicyParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.BucketSetPolicy has not yet been implemented")
|
|
}),
|
|
AdminAPIBulkUpdateUsersGroupsHandler: admin_api.BulkUpdateUsersGroupsHandlerFunc(func(params admin_api.BulkUpdateUsersGroupsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.BulkUpdateUsersGroups has not yet been implemented")
|
|
}),
|
|
AdminAPIConfigInfoHandler: admin_api.ConfigInfoHandlerFunc(func(params admin_api.ConfigInfoParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ConfigInfo has not yet been implemented")
|
|
}),
|
|
UserAPICreateBucketEventHandler: user_api.CreateBucketEventHandlerFunc(func(params user_api.CreateBucketEventParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.CreateBucketEvent has not yet been implemented")
|
|
}),
|
|
UserAPICreateServiceAccountHandler: user_api.CreateServiceAccountHandlerFunc(func(params user_api.CreateServiceAccountParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.CreateServiceAccount has not yet been implemented")
|
|
}),
|
|
AdminAPICreateTenantHandler: admin_api.CreateTenantHandlerFunc(func(params admin_api.CreateTenantParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.CreateTenant has not yet been implemented")
|
|
}),
|
|
UserAPIDeleteBucketHandler: user_api.DeleteBucketHandlerFunc(func(params user_api.DeleteBucketParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.DeleteBucket has not yet been implemented")
|
|
}),
|
|
UserAPIDeleteBucketEventHandler: user_api.DeleteBucketEventHandlerFunc(func(params user_api.DeleteBucketEventParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.DeleteBucketEvent has not yet been implemented")
|
|
}),
|
|
UserAPIDeleteObjectHandler: user_api.DeleteObjectHandlerFunc(func(params user_api.DeleteObjectParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.DeleteObject has not yet been implemented")
|
|
}),
|
|
UserAPIDeleteRemoteBucketHandler: user_api.DeleteRemoteBucketHandlerFunc(func(params user_api.DeleteRemoteBucketParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.DeleteRemoteBucket has not yet been implemented")
|
|
}),
|
|
UserAPIDeleteServiceAccountHandler: user_api.DeleteServiceAccountHandlerFunc(func(params user_api.DeleteServiceAccountParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.DeleteServiceAccount has not yet been implemented")
|
|
}),
|
|
AdminAPIDeleteTenantHandler: admin_api.DeleteTenantHandlerFunc(func(params admin_api.DeleteTenantParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.DeleteTenant has not yet been implemented")
|
|
}),
|
|
UserAPIGetBucketQuotaHandler: user_api.GetBucketQuotaHandlerFunc(func(params user_api.GetBucketQuotaParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.GetBucketQuota has not yet been implemented")
|
|
}),
|
|
UserAPIGetBucketReplicationHandler: user_api.GetBucketReplicationHandlerFunc(func(params user_api.GetBucketReplicationParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.GetBucketReplication has not yet been implemented")
|
|
}),
|
|
UserAPIGetBucketVersioningHandler: user_api.GetBucketVersioningHandlerFunc(func(params user_api.GetBucketVersioningParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.GetBucketVersioning has not yet been implemented")
|
|
}),
|
|
AdminAPIGetMaxAllocatableMemHandler: admin_api.GetMaxAllocatableMemHandlerFunc(func(params admin_api.GetMaxAllocatableMemParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.GetMaxAllocatableMem has not yet been implemented")
|
|
}),
|
|
AdminAPIGetParityHandler: admin_api.GetParityHandlerFunc(func(params admin_api.GetParityParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.GetParity has not yet been implemented")
|
|
}),
|
|
AdminAPIGetResourceQuotaHandler: admin_api.GetResourceQuotaHandlerFunc(func(params admin_api.GetResourceQuotaParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.GetResourceQuota has not yet been implemented")
|
|
}),
|
|
AdminAPIGetTenantUsageHandler: admin_api.GetTenantUsageHandlerFunc(func(params admin_api.GetTenantUsageParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.GetTenantUsage has not yet been implemented")
|
|
}),
|
|
AdminAPIGetUserInfoHandler: admin_api.GetUserInfoHandlerFunc(func(params admin_api.GetUserInfoParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.GetUserInfo has not yet been implemented")
|
|
}),
|
|
AdminAPIGroupInfoHandler: admin_api.GroupInfoHandlerFunc(func(params admin_api.GroupInfoParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.GroupInfo has not yet been implemented")
|
|
}),
|
|
AdminAPIListAllTenantsHandler: admin_api.ListAllTenantsHandlerFunc(func(params admin_api.ListAllTenantsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ListAllTenants has not yet been implemented")
|
|
}),
|
|
UserAPIListBucketEventsHandler: user_api.ListBucketEventsHandlerFunc(func(params user_api.ListBucketEventsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.ListBucketEvents has not yet been implemented")
|
|
}),
|
|
UserAPIListBucketsHandler: user_api.ListBucketsHandlerFunc(func(params user_api.ListBucketsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.ListBuckets has not yet been implemented")
|
|
}),
|
|
AdminAPIListConfigHandler: admin_api.ListConfigHandlerFunc(func(params admin_api.ListConfigParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ListConfig has not yet been implemented")
|
|
}),
|
|
AdminAPIListGroupsHandler: admin_api.ListGroupsHandlerFunc(func(params admin_api.ListGroupsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ListGroups has not yet been implemented")
|
|
}),
|
|
UserAPIListObjectsHandler: user_api.ListObjectsHandlerFunc(func(params user_api.ListObjectsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.ListObjects has not yet been implemented")
|
|
}),
|
|
AdminAPIListPoliciesHandler: admin_api.ListPoliciesHandlerFunc(func(params admin_api.ListPoliciesParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ListPolicies has not yet been implemented")
|
|
}),
|
|
UserAPIListRemoteBucketsHandler: user_api.ListRemoteBucketsHandlerFunc(func(params user_api.ListRemoteBucketsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.ListRemoteBuckets has not yet been implemented")
|
|
}),
|
|
AdminAPIListTenantsHandler: admin_api.ListTenantsHandlerFunc(func(params admin_api.ListTenantsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ListTenants has not yet been implemented")
|
|
}),
|
|
UserAPIListUserServiceAccountsHandler: user_api.ListUserServiceAccountsHandlerFunc(func(params user_api.ListUserServiceAccountsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.ListUserServiceAccounts has not yet been implemented")
|
|
}),
|
|
AdminAPIListUsersHandler: admin_api.ListUsersHandlerFunc(func(params admin_api.ListUsersParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ListUsers has not yet been implemented")
|
|
}),
|
|
UserAPILoginHandler: user_api.LoginHandlerFunc(func(params user_api.LoginParams) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.Login has not yet been implemented")
|
|
}),
|
|
UserAPILoginDetailHandler: user_api.LoginDetailHandlerFunc(func(params user_api.LoginDetailParams) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.LoginDetail has not yet been implemented")
|
|
}),
|
|
UserAPILoginOauth2AuthHandler: user_api.LoginOauth2AuthHandlerFunc(func(params user_api.LoginOauth2AuthParams) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.LoginOauth2Auth has not yet been implemented")
|
|
}),
|
|
UserAPILoginOperatorHandler: user_api.LoginOperatorHandlerFunc(func(params user_api.LoginOperatorParams) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.LoginOperator has not yet been implemented")
|
|
}),
|
|
UserAPILogoutHandler: user_api.LogoutHandlerFunc(func(params user_api.LogoutParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.Logout has not yet been implemented")
|
|
}),
|
|
UserAPIMakeBucketHandler: user_api.MakeBucketHandlerFunc(func(params user_api.MakeBucketParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.MakeBucket has not yet been implemented")
|
|
}),
|
|
AdminAPINotificationEndpointListHandler: admin_api.NotificationEndpointListHandlerFunc(func(params admin_api.NotificationEndpointListParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.NotificationEndpointList has not yet been implemented")
|
|
}),
|
|
AdminAPIPolicyInfoHandler: admin_api.PolicyInfoHandlerFunc(func(params admin_api.PolicyInfoParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.PolicyInfo has not yet been implemented")
|
|
}),
|
|
AdminAPIProfilingStartHandler: admin_api.ProfilingStartHandlerFunc(func(params admin_api.ProfilingStartParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ProfilingStart has not yet been implemented")
|
|
}),
|
|
AdminAPIProfilingStopHandler: admin_api.ProfilingStopHandlerFunc(func(params admin_api.ProfilingStopParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.ProfilingStop has not yet been implemented")
|
|
}),
|
|
UserAPIRemoteBucketDetailsHandler: user_api.RemoteBucketDetailsHandlerFunc(func(params user_api.RemoteBucketDetailsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.RemoteBucketDetails has not yet been implemented")
|
|
}),
|
|
AdminAPIRemoveGroupHandler: admin_api.RemoveGroupHandlerFunc(func(params admin_api.RemoveGroupParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.RemoveGroup has not yet been implemented")
|
|
}),
|
|
AdminAPIRemovePolicyHandler: admin_api.RemovePolicyHandlerFunc(func(params admin_api.RemovePolicyParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.RemovePolicy has not yet been implemented")
|
|
}),
|
|
AdminAPIRemoveUserHandler: admin_api.RemoveUserHandlerFunc(func(params admin_api.RemoveUserParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.RemoveUser has not yet been implemented")
|
|
}),
|
|
AdminAPIRestartServiceHandler: admin_api.RestartServiceHandlerFunc(func(params admin_api.RestartServiceParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.RestartService has not yet been implemented")
|
|
}),
|
|
UserAPISessionCheckHandler: user_api.SessionCheckHandlerFunc(func(params user_api.SessionCheckParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.SessionCheck has not yet been implemented")
|
|
}),
|
|
UserAPISetBucketQuotaHandler: user_api.SetBucketQuotaHandlerFunc(func(params user_api.SetBucketQuotaParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.SetBucketQuota has not yet been implemented")
|
|
}),
|
|
UserAPISetBucketVersioningHandler: user_api.SetBucketVersioningHandlerFunc(func(params user_api.SetBucketVersioningParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation user_api.SetBucketVersioning has not yet been implemented")
|
|
}),
|
|
AdminAPISetConfigHandler: admin_api.SetConfigHandlerFunc(func(params admin_api.SetConfigParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.SetConfig has not yet been implemented")
|
|
}),
|
|
AdminAPISetPolicyHandler: admin_api.SetPolicyHandlerFunc(func(params admin_api.SetPolicyParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.SetPolicy has not yet been implemented")
|
|
}),
|
|
AdminAPITenantAddZoneHandler: admin_api.TenantAddZoneHandlerFunc(func(params admin_api.TenantAddZoneParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.TenantAddZone has not yet been implemented")
|
|
}),
|
|
AdminAPITenantInfoHandler: admin_api.TenantInfoHandlerFunc(func(params admin_api.TenantInfoParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.TenantInfo has not yet been implemented")
|
|
}),
|
|
AdminAPITenantUpdateCertificateHandler: admin_api.TenantUpdateCertificateHandlerFunc(func(params admin_api.TenantUpdateCertificateParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.TenantUpdateCertificate has not yet been implemented")
|
|
}),
|
|
AdminAPITenantUpdateEncryptionHandler: admin_api.TenantUpdateEncryptionHandlerFunc(func(params admin_api.TenantUpdateEncryptionParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.TenantUpdateEncryption has not yet been implemented")
|
|
}),
|
|
AdminAPITenantUpdateZonesHandler: admin_api.TenantUpdateZonesHandlerFunc(func(params admin_api.TenantUpdateZonesParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.TenantUpdateZones has not yet been implemented")
|
|
}),
|
|
AdminAPIUpdateGroupHandler: admin_api.UpdateGroupHandlerFunc(func(params admin_api.UpdateGroupParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.UpdateGroup has not yet been implemented")
|
|
}),
|
|
AdminAPIUpdateTenantHandler: admin_api.UpdateTenantHandlerFunc(func(params admin_api.UpdateTenantParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.UpdateTenant has not yet been implemented")
|
|
}),
|
|
AdminAPIUpdateUserGroupsHandler: admin_api.UpdateUserGroupsHandlerFunc(func(params admin_api.UpdateUserGroupsParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.UpdateUserGroups has not yet been implemented")
|
|
}),
|
|
AdminAPIUpdateUserInfoHandler: admin_api.UpdateUserInfoHandlerFunc(func(params admin_api.UpdateUserInfoParams, principal *models.Principal) middleware.Responder {
|
|
return middleware.NotImplemented("operation admin_api.UpdateUserInfo has not yet been implemented")
|
|
}),
|
|
|
|
KeyAuth: func(token string, scopes []string) (*models.Principal, error) {
|
|
return nil, errors.NotImplemented("oauth2 bearer auth (key) has not yet been implemented")
|
|
},
|
|
// default authorizer is authorized meaning no requests are blocked
|
|
APIAuthorizer: security.Authorized(),
|
|
}
|
|
}
|
|
|
|
/*ConsoleAPI the console API */
|
|
type ConsoleAPI struct {
|
|
spec *loads.Document
|
|
context *middleware.Context
|
|
handlers map[string]map[string]http.Handler
|
|
formats strfmt.Registry
|
|
customConsumers map[string]runtime.Consumer
|
|
customProducers map[string]runtime.Producer
|
|
defaultConsumes string
|
|
defaultProduces string
|
|
Middleware func(middleware.Builder) http.Handler
|
|
|
|
// BasicAuthenticator generates a runtime.Authenticator from the supplied basic auth function.
|
|
// It has a default implementation in the security package, however you can replace it for your particular usage.
|
|
BasicAuthenticator func(security.UserPassAuthentication) runtime.Authenticator
|
|
// APIKeyAuthenticator generates a runtime.Authenticator from the supplied token auth function.
|
|
// It has a default implementation in the security package, however you can replace it for your particular usage.
|
|
APIKeyAuthenticator func(string, string, security.TokenAuthentication) runtime.Authenticator
|
|
// BearerAuthenticator generates a runtime.Authenticator from the supplied bearer token auth function.
|
|
// It has a default implementation in the security package, however you can replace it for your particular usage.
|
|
BearerAuthenticator func(string, security.ScopedTokenAuthentication) runtime.Authenticator
|
|
|
|
// JSONConsumer registers a consumer for the following mime types:
|
|
// - application/json
|
|
JSONConsumer runtime.Consumer
|
|
|
|
// BinProducer registers a producer for the following mime types:
|
|
// - application/octet-stream
|
|
BinProducer runtime.Producer
|
|
// JSONProducer registers a producer for the following mime types:
|
|
// - application/json
|
|
JSONProducer runtime.Producer
|
|
|
|
// KeyAuth registers a function that takes an access token and a collection of required scopes and returns a principal
|
|
// it performs authentication based on an oauth2 bearer token provided in the request
|
|
KeyAuth func(string, []string) (*models.Principal, error)
|
|
|
|
// APIAuthorizer provides access control (ACL/RBAC/ABAC) by providing access to the request and authenticated principal
|
|
APIAuthorizer runtime.Authorizer
|
|
|
|
// UserAPIAddBucketReplicationHandler sets the operation handler for the add bucket replication operation
|
|
UserAPIAddBucketReplicationHandler user_api.AddBucketReplicationHandler
|
|
// AdminAPIAddGroupHandler sets the operation handler for the add group operation
|
|
AdminAPIAddGroupHandler admin_api.AddGroupHandler
|
|
// AdminAPIAddNotificationEndpointHandler sets the operation handler for the add notification endpoint operation
|
|
AdminAPIAddNotificationEndpointHandler admin_api.AddNotificationEndpointHandler
|
|
// AdminAPIAddPolicyHandler sets the operation handler for the add policy operation
|
|
AdminAPIAddPolicyHandler admin_api.AddPolicyHandler
|
|
// UserAPIAddRemoteBucketHandler sets the operation handler for the add remote bucket operation
|
|
UserAPIAddRemoteBucketHandler user_api.AddRemoteBucketHandler
|
|
// AdminAPIAddUserHandler sets the operation handler for the add user operation
|
|
AdminAPIAddUserHandler admin_api.AddUserHandler
|
|
// AdminAPIAdminInfoHandler sets the operation handler for the admin info operation
|
|
AdminAPIAdminInfoHandler admin_api.AdminInfoHandler
|
|
// AdminAPIArnListHandler sets the operation handler for the arn list operation
|
|
AdminAPIArnListHandler admin_api.ArnListHandler
|
|
// UserAPIBucketInfoHandler sets the operation handler for the bucket info operation
|
|
UserAPIBucketInfoHandler user_api.BucketInfoHandler
|
|
// UserAPIBucketSetPolicyHandler sets the operation handler for the bucket set policy operation
|
|
UserAPIBucketSetPolicyHandler user_api.BucketSetPolicyHandler
|
|
// AdminAPIBulkUpdateUsersGroupsHandler sets the operation handler for the bulk update users groups operation
|
|
AdminAPIBulkUpdateUsersGroupsHandler admin_api.BulkUpdateUsersGroupsHandler
|
|
// AdminAPIConfigInfoHandler sets the operation handler for the config info operation
|
|
AdminAPIConfigInfoHandler admin_api.ConfigInfoHandler
|
|
// UserAPICreateBucketEventHandler sets the operation handler for the create bucket event operation
|
|
UserAPICreateBucketEventHandler user_api.CreateBucketEventHandler
|
|
// UserAPICreateServiceAccountHandler sets the operation handler for the create service account operation
|
|
UserAPICreateServiceAccountHandler user_api.CreateServiceAccountHandler
|
|
// AdminAPICreateTenantHandler sets the operation handler for the create tenant operation
|
|
AdminAPICreateTenantHandler admin_api.CreateTenantHandler
|
|
// UserAPIDeleteBucketHandler sets the operation handler for the delete bucket operation
|
|
UserAPIDeleteBucketHandler user_api.DeleteBucketHandler
|
|
// UserAPIDeleteBucketEventHandler sets the operation handler for the delete bucket event operation
|
|
UserAPIDeleteBucketEventHandler user_api.DeleteBucketEventHandler
|
|
// UserAPIDeleteObjectHandler sets the operation handler for the delete object operation
|
|
UserAPIDeleteObjectHandler user_api.DeleteObjectHandler
|
|
// UserAPIDeleteRemoteBucketHandler sets the operation handler for the delete remote bucket operation
|
|
UserAPIDeleteRemoteBucketHandler user_api.DeleteRemoteBucketHandler
|
|
// UserAPIDeleteServiceAccountHandler sets the operation handler for the delete service account operation
|
|
UserAPIDeleteServiceAccountHandler user_api.DeleteServiceAccountHandler
|
|
// AdminAPIDeleteTenantHandler sets the operation handler for the delete tenant operation
|
|
AdminAPIDeleteTenantHandler admin_api.DeleteTenantHandler
|
|
// UserAPIGetBucketQuotaHandler sets the operation handler for the get bucket quota operation
|
|
UserAPIGetBucketQuotaHandler user_api.GetBucketQuotaHandler
|
|
// UserAPIGetBucketReplicationHandler sets the operation handler for the get bucket replication operation
|
|
UserAPIGetBucketReplicationHandler user_api.GetBucketReplicationHandler
|
|
// UserAPIGetBucketVersioningHandler sets the operation handler for the get bucket versioning operation
|
|
UserAPIGetBucketVersioningHandler user_api.GetBucketVersioningHandler
|
|
// AdminAPIGetMaxAllocatableMemHandler sets the operation handler for the get max allocatable mem operation
|
|
AdminAPIGetMaxAllocatableMemHandler admin_api.GetMaxAllocatableMemHandler
|
|
// AdminAPIGetParityHandler sets the operation handler for the get parity operation
|
|
AdminAPIGetParityHandler admin_api.GetParityHandler
|
|
// AdminAPIGetResourceQuotaHandler sets the operation handler for the get resource quota operation
|
|
AdminAPIGetResourceQuotaHandler admin_api.GetResourceQuotaHandler
|
|
// AdminAPIGetTenantUsageHandler sets the operation handler for the get tenant usage operation
|
|
AdminAPIGetTenantUsageHandler admin_api.GetTenantUsageHandler
|
|
// AdminAPIGetUserInfoHandler sets the operation handler for the get user info operation
|
|
AdminAPIGetUserInfoHandler admin_api.GetUserInfoHandler
|
|
// AdminAPIGroupInfoHandler sets the operation handler for the group info operation
|
|
AdminAPIGroupInfoHandler admin_api.GroupInfoHandler
|
|
// AdminAPIListAllTenantsHandler sets the operation handler for the list all tenants operation
|
|
AdminAPIListAllTenantsHandler admin_api.ListAllTenantsHandler
|
|
// UserAPIListBucketEventsHandler sets the operation handler for the list bucket events operation
|
|
UserAPIListBucketEventsHandler user_api.ListBucketEventsHandler
|
|
// UserAPIListBucketsHandler sets the operation handler for the list buckets operation
|
|
UserAPIListBucketsHandler user_api.ListBucketsHandler
|
|
// AdminAPIListConfigHandler sets the operation handler for the list config operation
|
|
AdminAPIListConfigHandler admin_api.ListConfigHandler
|
|
// AdminAPIListGroupsHandler sets the operation handler for the list groups operation
|
|
AdminAPIListGroupsHandler admin_api.ListGroupsHandler
|
|
// UserAPIListObjectsHandler sets the operation handler for the list objects operation
|
|
UserAPIListObjectsHandler user_api.ListObjectsHandler
|
|
// AdminAPIListPoliciesHandler sets the operation handler for the list policies operation
|
|
AdminAPIListPoliciesHandler admin_api.ListPoliciesHandler
|
|
// UserAPIListRemoteBucketsHandler sets the operation handler for the list remote buckets operation
|
|
UserAPIListRemoteBucketsHandler user_api.ListRemoteBucketsHandler
|
|
// AdminAPIListTenantsHandler sets the operation handler for the list tenants operation
|
|
AdminAPIListTenantsHandler admin_api.ListTenantsHandler
|
|
// UserAPIListUserServiceAccountsHandler sets the operation handler for the list user service accounts operation
|
|
UserAPIListUserServiceAccountsHandler user_api.ListUserServiceAccountsHandler
|
|
// AdminAPIListUsersHandler sets the operation handler for the list users operation
|
|
AdminAPIListUsersHandler admin_api.ListUsersHandler
|
|
// UserAPILoginHandler sets the operation handler for the login operation
|
|
UserAPILoginHandler user_api.LoginHandler
|
|
// UserAPILoginDetailHandler sets the operation handler for the login detail operation
|
|
UserAPILoginDetailHandler user_api.LoginDetailHandler
|
|
// UserAPILoginOauth2AuthHandler sets the operation handler for the login oauth2 auth operation
|
|
UserAPILoginOauth2AuthHandler user_api.LoginOauth2AuthHandler
|
|
// UserAPILoginOperatorHandler sets the operation handler for the login operator operation
|
|
UserAPILoginOperatorHandler user_api.LoginOperatorHandler
|
|
// UserAPILogoutHandler sets the operation handler for the logout operation
|
|
UserAPILogoutHandler user_api.LogoutHandler
|
|
// UserAPIMakeBucketHandler sets the operation handler for the make bucket operation
|
|
UserAPIMakeBucketHandler user_api.MakeBucketHandler
|
|
// AdminAPINotificationEndpointListHandler sets the operation handler for the notification endpoint list operation
|
|
AdminAPINotificationEndpointListHandler admin_api.NotificationEndpointListHandler
|
|
// AdminAPIPolicyInfoHandler sets the operation handler for the policy info operation
|
|
AdminAPIPolicyInfoHandler admin_api.PolicyInfoHandler
|
|
// AdminAPIProfilingStartHandler sets the operation handler for the profiling start operation
|
|
AdminAPIProfilingStartHandler admin_api.ProfilingStartHandler
|
|
// AdminAPIProfilingStopHandler sets the operation handler for the profiling stop operation
|
|
AdminAPIProfilingStopHandler admin_api.ProfilingStopHandler
|
|
// UserAPIRemoteBucketDetailsHandler sets the operation handler for the remote bucket details operation
|
|
UserAPIRemoteBucketDetailsHandler user_api.RemoteBucketDetailsHandler
|
|
// AdminAPIRemoveGroupHandler sets the operation handler for the remove group operation
|
|
AdminAPIRemoveGroupHandler admin_api.RemoveGroupHandler
|
|
// AdminAPIRemovePolicyHandler sets the operation handler for the remove policy operation
|
|
AdminAPIRemovePolicyHandler admin_api.RemovePolicyHandler
|
|
// AdminAPIRemoveUserHandler sets the operation handler for the remove user operation
|
|
AdminAPIRemoveUserHandler admin_api.RemoveUserHandler
|
|
// AdminAPIRestartServiceHandler sets the operation handler for the restart service operation
|
|
AdminAPIRestartServiceHandler admin_api.RestartServiceHandler
|
|
// UserAPISessionCheckHandler sets the operation handler for the session check operation
|
|
UserAPISessionCheckHandler user_api.SessionCheckHandler
|
|
// UserAPISetBucketQuotaHandler sets the operation handler for the set bucket quota operation
|
|
UserAPISetBucketQuotaHandler user_api.SetBucketQuotaHandler
|
|
// UserAPISetBucketVersioningHandler sets the operation handler for the set bucket versioning operation
|
|
UserAPISetBucketVersioningHandler user_api.SetBucketVersioningHandler
|
|
// AdminAPISetConfigHandler sets the operation handler for the set config operation
|
|
AdminAPISetConfigHandler admin_api.SetConfigHandler
|
|
// AdminAPISetPolicyHandler sets the operation handler for the set policy operation
|
|
AdminAPISetPolicyHandler admin_api.SetPolicyHandler
|
|
// AdminAPITenantAddZoneHandler sets the operation handler for the tenant add zone operation
|
|
AdminAPITenantAddZoneHandler admin_api.TenantAddZoneHandler
|
|
// AdminAPITenantInfoHandler sets the operation handler for the tenant info operation
|
|
AdminAPITenantInfoHandler admin_api.TenantInfoHandler
|
|
// AdminAPITenantUpdateCertificateHandler sets the operation handler for the tenant update certificate operation
|
|
AdminAPITenantUpdateCertificateHandler admin_api.TenantUpdateCertificateHandler
|
|
// AdminAPITenantUpdateEncryptionHandler sets the operation handler for the tenant update encryption operation
|
|
AdminAPITenantUpdateEncryptionHandler admin_api.TenantUpdateEncryptionHandler
|
|
// AdminAPITenantUpdateZonesHandler sets the operation handler for the tenant update zones operation
|
|
AdminAPITenantUpdateZonesHandler admin_api.TenantUpdateZonesHandler
|
|
// AdminAPIUpdateGroupHandler sets the operation handler for the update group operation
|
|
AdminAPIUpdateGroupHandler admin_api.UpdateGroupHandler
|
|
// AdminAPIUpdateTenantHandler sets the operation handler for the update tenant operation
|
|
AdminAPIUpdateTenantHandler admin_api.UpdateTenantHandler
|
|
// AdminAPIUpdateUserGroupsHandler sets the operation handler for the update user groups operation
|
|
AdminAPIUpdateUserGroupsHandler admin_api.UpdateUserGroupsHandler
|
|
// AdminAPIUpdateUserInfoHandler sets the operation handler for the update user info operation
|
|
AdminAPIUpdateUserInfoHandler admin_api.UpdateUserInfoHandler
|
|
// ServeError is called when an error is received, there is a default handler
|
|
// but you can set your own with this
|
|
ServeError func(http.ResponseWriter, *http.Request, error)
|
|
|
|
// PreServerShutdown is called before the HTTP(S) server is shutdown
|
|
// This allows for custom functions to get executed before the HTTP(S) server stops accepting traffic
|
|
PreServerShutdown func()
|
|
|
|
// ServerShutdown is called when the HTTP(S) server is shut down and done
|
|
// handling all active connections and does not accept connections any more
|
|
ServerShutdown func()
|
|
|
|
// Custom command line argument groups with their descriptions
|
|
CommandLineOptionsGroups []swag.CommandLineOptionsGroup
|
|
|
|
// User defined logger function.
|
|
Logger func(string, ...interface{})
|
|
}
|
|
|
|
// SetDefaultProduces sets the default produces media type
|
|
func (o *ConsoleAPI) SetDefaultProduces(mediaType string) {
|
|
o.defaultProduces = mediaType
|
|
}
|
|
|
|
// SetDefaultConsumes returns the default consumes media type
|
|
func (o *ConsoleAPI) SetDefaultConsumes(mediaType string) {
|
|
o.defaultConsumes = mediaType
|
|
}
|
|
|
|
// SetSpec sets a spec that will be served for the clients.
|
|
func (o *ConsoleAPI) SetSpec(spec *loads.Document) {
|
|
o.spec = spec
|
|
}
|
|
|
|
// DefaultProduces returns the default produces media type
|
|
func (o *ConsoleAPI) DefaultProduces() string {
|
|
return o.defaultProduces
|
|
}
|
|
|
|
// DefaultConsumes returns the default consumes media type
|
|
func (o *ConsoleAPI) DefaultConsumes() string {
|
|
return o.defaultConsumes
|
|
}
|
|
|
|
// Formats returns the registered string formats
|
|
func (o *ConsoleAPI) Formats() strfmt.Registry {
|
|
return o.formats
|
|
}
|
|
|
|
// RegisterFormat registers a custom format validator
|
|
func (o *ConsoleAPI) RegisterFormat(name string, format strfmt.Format, validator strfmt.Validator) {
|
|
o.formats.Add(name, format, validator)
|
|
}
|
|
|
|
// Validate validates the registrations in the ConsoleAPI
|
|
func (o *ConsoleAPI) Validate() error {
|
|
var unregistered []string
|
|
|
|
if o.JSONConsumer == nil {
|
|
unregistered = append(unregistered, "JSONConsumer")
|
|
}
|
|
|
|
if o.BinProducer == nil {
|
|
unregistered = append(unregistered, "BinProducer")
|
|
}
|
|
if o.JSONProducer == nil {
|
|
unregistered = append(unregistered, "JSONProducer")
|
|
}
|
|
|
|
if o.KeyAuth == nil {
|
|
unregistered = append(unregistered, "KeyAuth")
|
|
}
|
|
|
|
if o.UserAPIAddBucketReplicationHandler == nil {
|
|
unregistered = append(unregistered, "user_api.AddBucketReplicationHandler")
|
|
}
|
|
if o.AdminAPIAddGroupHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.AddGroupHandler")
|
|
}
|
|
if o.AdminAPIAddNotificationEndpointHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.AddNotificationEndpointHandler")
|
|
}
|
|
if o.AdminAPIAddPolicyHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.AddPolicyHandler")
|
|
}
|
|
if o.UserAPIAddRemoteBucketHandler == nil {
|
|
unregistered = append(unregistered, "user_api.AddRemoteBucketHandler")
|
|
}
|
|
if o.AdminAPIAddUserHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.AddUserHandler")
|
|
}
|
|
if o.AdminAPIAdminInfoHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.AdminInfoHandler")
|
|
}
|
|
if o.AdminAPIArnListHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ArnListHandler")
|
|
}
|
|
if o.UserAPIBucketInfoHandler == nil {
|
|
unregistered = append(unregistered, "user_api.BucketInfoHandler")
|
|
}
|
|
if o.UserAPIBucketSetPolicyHandler == nil {
|
|
unregistered = append(unregistered, "user_api.BucketSetPolicyHandler")
|
|
}
|
|
if o.AdminAPIBulkUpdateUsersGroupsHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.BulkUpdateUsersGroupsHandler")
|
|
}
|
|
if o.AdminAPIConfigInfoHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ConfigInfoHandler")
|
|
}
|
|
if o.UserAPICreateBucketEventHandler == nil {
|
|
unregistered = append(unregistered, "user_api.CreateBucketEventHandler")
|
|
}
|
|
if o.UserAPICreateServiceAccountHandler == nil {
|
|
unregistered = append(unregistered, "user_api.CreateServiceAccountHandler")
|
|
}
|
|
if o.AdminAPICreateTenantHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.CreateTenantHandler")
|
|
}
|
|
if o.UserAPIDeleteBucketHandler == nil {
|
|
unregistered = append(unregistered, "user_api.DeleteBucketHandler")
|
|
}
|
|
if o.UserAPIDeleteBucketEventHandler == nil {
|
|
unregistered = append(unregistered, "user_api.DeleteBucketEventHandler")
|
|
}
|
|
if o.UserAPIDeleteObjectHandler == nil {
|
|
unregistered = append(unregistered, "user_api.DeleteObjectHandler")
|
|
}
|
|
if o.UserAPIDeleteRemoteBucketHandler == nil {
|
|
unregistered = append(unregistered, "user_api.DeleteRemoteBucketHandler")
|
|
}
|
|
if o.UserAPIDeleteServiceAccountHandler == nil {
|
|
unregistered = append(unregistered, "user_api.DeleteServiceAccountHandler")
|
|
}
|
|
if o.AdminAPIDeleteTenantHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.DeleteTenantHandler")
|
|
}
|
|
if o.UserAPIGetBucketQuotaHandler == nil {
|
|
unregistered = append(unregistered, "user_api.GetBucketQuotaHandler")
|
|
}
|
|
if o.UserAPIGetBucketReplicationHandler == nil {
|
|
unregistered = append(unregistered, "user_api.GetBucketReplicationHandler")
|
|
}
|
|
if o.UserAPIGetBucketVersioningHandler == nil {
|
|
unregistered = append(unregistered, "user_api.GetBucketVersioningHandler")
|
|
}
|
|
if o.AdminAPIGetMaxAllocatableMemHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.GetMaxAllocatableMemHandler")
|
|
}
|
|
if o.AdminAPIGetParityHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.GetParityHandler")
|
|
}
|
|
if o.AdminAPIGetResourceQuotaHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.GetResourceQuotaHandler")
|
|
}
|
|
if o.AdminAPIGetTenantUsageHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.GetTenantUsageHandler")
|
|
}
|
|
if o.AdminAPIGetUserInfoHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.GetUserInfoHandler")
|
|
}
|
|
if o.AdminAPIGroupInfoHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.GroupInfoHandler")
|
|
}
|
|
if o.AdminAPIListAllTenantsHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ListAllTenantsHandler")
|
|
}
|
|
if o.UserAPIListBucketEventsHandler == nil {
|
|
unregistered = append(unregistered, "user_api.ListBucketEventsHandler")
|
|
}
|
|
if o.UserAPIListBucketsHandler == nil {
|
|
unregistered = append(unregistered, "user_api.ListBucketsHandler")
|
|
}
|
|
if o.AdminAPIListConfigHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ListConfigHandler")
|
|
}
|
|
if o.AdminAPIListGroupsHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ListGroupsHandler")
|
|
}
|
|
if o.UserAPIListObjectsHandler == nil {
|
|
unregistered = append(unregistered, "user_api.ListObjectsHandler")
|
|
}
|
|
if o.AdminAPIListPoliciesHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ListPoliciesHandler")
|
|
}
|
|
if o.UserAPIListRemoteBucketsHandler == nil {
|
|
unregistered = append(unregistered, "user_api.ListRemoteBucketsHandler")
|
|
}
|
|
if o.AdminAPIListTenantsHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ListTenantsHandler")
|
|
}
|
|
if o.UserAPIListUserServiceAccountsHandler == nil {
|
|
unregistered = append(unregistered, "user_api.ListUserServiceAccountsHandler")
|
|
}
|
|
if o.AdminAPIListUsersHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ListUsersHandler")
|
|
}
|
|
if o.UserAPILoginHandler == nil {
|
|
unregistered = append(unregistered, "user_api.LoginHandler")
|
|
}
|
|
if o.UserAPILoginDetailHandler == nil {
|
|
unregistered = append(unregistered, "user_api.LoginDetailHandler")
|
|
}
|
|
if o.UserAPILoginOauth2AuthHandler == nil {
|
|
unregistered = append(unregistered, "user_api.LoginOauth2AuthHandler")
|
|
}
|
|
if o.UserAPILoginOperatorHandler == nil {
|
|
unregistered = append(unregistered, "user_api.LoginOperatorHandler")
|
|
}
|
|
if o.UserAPILogoutHandler == nil {
|
|
unregistered = append(unregistered, "user_api.LogoutHandler")
|
|
}
|
|
if o.UserAPIMakeBucketHandler == nil {
|
|
unregistered = append(unregistered, "user_api.MakeBucketHandler")
|
|
}
|
|
if o.AdminAPINotificationEndpointListHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.NotificationEndpointListHandler")
|
|
}
|
|
if o.AdminAPIPolicyInfoHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.PolicyInfoHandler")
|
|
}
|
|
if o.AdminAPIProfilingStartHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ProfilingStartHandler")
|
|
}
|
|
if o.AdminAPIProfilingStopHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.ProfilingStopHandler")
|
|
}
|
|
if o.UserAPIRemoteBucketDetailsHandler == nil {
|
|
unregistered = append(unregistered, "user_api.RemoteBucketDetailsHandler")
|
|
}
|
|
if o.AdminAPIRemoveGroupHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.RemoveGroupHandler")
|
|
}
|
|
if o.AdminAPIRemovePolicyHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.RemovePolicyHandler")
|
|
}
|
|
if o.AdminAPIRemoveUserHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.RemoveUserHandler")
|
|
}
|
|
if o.AdminAPIRestartServiceHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.RestartServiceHandler")
|
|
}
|
|
if o.UserAPISessionCheckHandler == nil {
|
|
unregistered = append(unregistered, "user_api.SessionCheckHandler")
|
|
}
|
|
if o.UserAPISetBucketQuotaHandler == nil {
|
|
unregistered = append(unregistered, "user_api.SetBucketQuotaHandler")
|
|
}
|
|
if o.UserAPISetBucketVersioningHandler == nil {
|
|
unregistered = append(unregistered, "user_api.SetBucketVersioningHandler")
|
|
}
|
|
if o.AdminAPISetConfigHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.SetConfigHandler")
|
|
}
|
|
if o.AdminAPISetPolicyHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.SetPolicyHandler")
|
|
}
|
|
if o.AdminAPITenantAddZoneHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.TenantAddZoneHandler")
|
|
}
|
|
if o.AdminAPITenantInfoHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.TenantInfoHandler")
|
|
}
|
|
if o.AdminAPITenantUpdateCertificateHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.TenantUpdateCertificateHandler")
|
|
}
|
|
if o.AdminAPITenantUpdateEncryptionHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.TenantUpdateEncryptionHandler")
|
|
}
|
|
if o.AdminAPITenantUpdateZonesHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.TenantUpdateZonesHandler")
|
|
}
|
|
if o.AdminAPIUpdateGroupHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.UpdateGroupHandler")
|
|
}
|
|
if o.AdminAPIUpdateTenantHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.UpdateTenantHandler")
|
|
}
|
|
if o.AdminAPIUpdateUserGroupsHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.UpdateUserGroupsHandler")
|
|
}
|
|
if o.AdminAPIUpdateUserInfoHandler == nil {
|
|
unregistered = append(unregistered, "admin_api.UpdateUserInfoHandler")
|
|
}
|
|
|
|
if len(unregistered) > 0 {
|
|
return fmt.Errorf("missing registration: %s", strings.Join(unregistered, ", "))
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
// ServeErrorFor gets a error handler for a given operation id
|
|
func (o *ConsoleAPI) ServeErrorFor(operationID string) func(http.ResponseWriter, *http.Request, error) {
|
|
return o.ServeError
|
|
}
|
|
|
|
// AuthenticatorsFor gets the authenticators for the specified security schemes
|
|
func (o *ConsoleAPI) AuthenticatorsFor(schemes map[string]spec.SecurityScheme) map[string]runtime.Authenticator {
|
|
result := make(map[string]runtime.Authenticator)
|
|
for name := range schemes {
|
|
switch name {
|
|
case "key":
|
|
result[name] = o.BearerAuthenticator(name, func(token string, scopes []string) (interface{}, error) {
|
|
return o.KeyAuth(token, scopes)
|
|
})
|
|
|
|
}
|
|
}
|
|
return result
|
|
}
|
|
|
|
// Authorizer returns the registered authorizer
|
|
func (o *ConsoleAPI) Authorizer() runtime.Authorizer {
|
|
return o.APIAuthorizer
|
|
}
|
|
|
|
// ConsumersFor gets the consumers for the specified media types.
|
|
// MIME type parameters are ignored here.
|
|
func (o *ConsoleAPI) ConsumersFor(mediaTypes []string) map[string]runtime.Consumer {
|
|
result := make(map[string]runtime.Consumer, len(mediaTypes))
|
|
for _, mt := range mediaTypes {
|
|
switch mt {
|
|
case "application/json":
|
|
result["application/json"] = o.JSONConsumer
|
|
}
|
|
|
|
if c, ok := o.customConsumers[mt]; ok {
|
|
result[mt] = c
|
|
}
|
|
}
|
|
return result
|
|
}
|
|
|
|
// ProducersFor gets the producers for the specified media types.
|
|
// MIME type parameters are ignored here.
|
|
func (o *ConsoleAPI) ProducersFor(mediaTypes []string) map[string]runtime.Producer {
|
|
result := make(map[string]runtime.Producer, len(mediaTypes))
|
|
for _, mt := range mediaTypes {
|
|
switch mt {
|
|
case "application/octet-stream":
|
|
result["application/octet-stream"] = o.BinProducer
|
|
case "application/json":
|
|
result["application/json"] = o.JSONProducer
|
|
}
|
|
|
|
if p, ok := o.customProducers[mt]; ok {
|
|
result[mt] = p
|
|
}
|
|
}
|
|
return result
|
|
}
|
|
|
|
// HandlerFor gets a http.Handler for the provided operation method and path
|
|
func (o *ConsoleAPI) HandlerFor(method, path string) (http.Handler, bool) {
|
|
if o.handlers == nil {
|
|
return nil, false
|
|
}
|
|
um := strings.ToUpper(method)
|
|
if _, ok := o.handlers[um]; !ok {
|
|
return nil, false
|
|
}
|
|
if path == "/" {
|
|
path = ""
|
|
}
|
|
h, ok := o.handlers[um][path]
|
|
return h, ok
|
|
}
|
|
|
|
// Context returns the middleware context for the console API
|
|
func (o *ConsoleAPI) Context() *middleware.Context {
|
|
if o.context == nil {
|
|
o.context = middleware.NewRoutableContext(o.spec, o, nil)
|
|
}
|
|
|
|
return o.context
|
|
}
|
|
|
|
func (o *ConsoleAPI) initHandlerCache() {
|
|
o.Context() // don't care about the result, just that the initialization happened
|
|
if o.handlers == nil {
|
|
o.handlers = make(map[string]map[string]http.Handler)
|
|
}
|
|
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/buckets/{bucket_name}/replication"] = user_api.NewAddBucketReplication(o.context, o.UserAPIAddBucketReplicationHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/groups"] = admin_api.NewAddGroup(o.context, o.AdminAPIAddGroupHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/admin/notification_endpoints"] = admin_api.NewAddNotificationEndpoint(o.context, o.AdminAPIAddNotificationEndpointHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/policies"] = admin_api.NewAddPolicy(o.context, o.AdminAPIAddPolicyHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/remote-buckets"] = user_api.NewAddRemoteBucket(o.context, o.UserAPIAddRemoteBucketHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/users"] = admin_api.NewAddUser(o.context, o.AdminAPIAddUserHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/admin/info"] = admin_api.NewAdminInfo(o.context, o.AdminAPIAdminInfoHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/admin/arns"] = admin_api.NewArnList(o.context, o.AdminAPIArnListHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/buckets/{name}"] = user_api.NewBucketInfo(o.context, o.UserAPIBucketInfoHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/buckets/{name}/set-policy"] = user_api.NewBucketSetPolicy(o.context, o.UserAPIBucketSetPolicyHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/users-groups-bulk"] = admin_api.NewBulkUpdateUsersGroups(o.context, o.AdminAPIBulkUpdateUsersGroupsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/configs/{name}"] = admin_api.NewConfigInfo(o.context, o.AdminAPIConfigInfoHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/buckets/{bucket_name}/events"] = user_api.NewCreateBucketEvent(o.context, o.UserAPICreateBucketEventHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/service-accounts"] = user_api.NewCreateServiceAccount(o.context, o.UserAPICreateServiceAccountHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/tenants"] = admin_api.NewCreateTenant(o.context, o.AdminAPICreateTenantHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/buckets/{name}"] = user_api.NewDeleteBucket(o.context, o.UserAPIDeleteBucketHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/buckets/{bucket_name}/events/{arn}"] = user_api.NewDeleteBucketEvent(o.context, o.UserAPIDeleteBucketEventHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/buckets/{bucket_name}/objects"] = user_api.NewDeleteObject(o.context, o.UserAPIDeleteObjectHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/remote-buckets/{source-bucket-name}/{arn}"] = user_api.NewDeleteRemoteBucket(o.context, o.UserAPIDeleteRemoteBucketHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/service-accounts/{access_key}"] = user_api.NewDeleteServiceAccount(o.context, o.UserAPIDeleteServiceAccountHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/namespaces/{namespace}/tenants/{tenant}"] = admin_api.NewDeleteTenant(o.context, o.AdminAPIDeleteTenantHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/buckets/{name}/quota"] = user_api.NewGetBucketQuota(o.context, o.UserAPIGetBucketQuotaHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/buckets/{bucket_name}/replication"] = user_api.NewGetBucketReplication(o.context, o.UserAPIGetBucketReplicationHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/buckets/{bucket_name}/versioning"] = user_api.NewGetBucketVersioning(o.context, o.UserAPIGetBucketVersioningHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/cluster/max-allocatable-memory"] = admin_api.NewGetMaxAllocatableMem(o.context, o.AdminAPIGetMaxAllocatableMemHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/get-parity/{nodes}/{disksPerNode}"] = admin_api.NewGetParity(o.context, o.AdminAPIGetParityHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/namespaces/{namespace}/resourcequotas/{resource-quota-name}"] = admin_api.NewGetResourceQuota(o.context, o.AdminAPIGetResourceQuotaHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/namespaces/{namespace}/tenants/{tenant}/usage"] = admin_api.NewGetTenantUsage(o.context, o.AdminAPIGetTenantUsageHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/users/{name}"] = admin_api.NewGetUserInfo(o.context, o.AdminAPIGetUserInfoHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/groups/{name}"] = admin_api.NewGroupInfo(o.context, o.AdminAPIGroupInfoHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/tenants"] = admin_api.NewListAllTenants(o.context, o.AdminAPIListAllTenantsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/buckets/{bucket_name}/events"] = user_api.NewListBucketEvents(o.context, o.UserAPIListBucketEventsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/buckets"] = user_api.NewListBuckets(o.context, o.UserAPIListBucketsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/configs"] = admin_api.NewListConfig(o.context, o.AdminAPIListConfigHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/groups"] = admin_api.NewListGroups(o.context, o.AdminAPIListGroupsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/buckets/{bucket_name}/objects"] = user_api.NewListObjects(o.context, o.UserAPIListObjectsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/policies"] = admin_api.NewListPolicies(o.context, o.AdminAPIListPoliciesHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/remote-buckets"] = user_api.NewListRemoteBuckets(o.context, o.UserAPIListRemoteBucketsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/namespaces/{namespace}/tenants"] = admin_api.NewListTenants(o.context, o.AdminAPIListTenantsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/service-accounts"] = user_api.NewListUserServiceAccounts(o.context, o.UserAPIListUserServiceAccountsHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/users"] = admin_api.NewListUsers(o.context, o.AdminAPIListUsersHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/login"] = user_api.NewLogin(o.context, o.UserAPILoginHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/login"] = user_api.NewLoginDetail(o.context, o.UserAPILoginDetailHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/login/oauth2/auth"] = user_api.NewLoginOauth2Auth(o.context, o.UserAPILoginOauth2AuthHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/login/operator"] = user_api.NewLoginOperator(o.context, o.UserAPILoginOperatorHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/logout"] = user_api.NewLogout(o.context, o.UserAPILogoutHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/buckets"] = user_api.NewMakeBucket(o.context, o.UserAPIMakeBucketHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/admin/notification_endpoints"] = admin_api.NewNotificationEndpointList(o.context, o.AdminAPINotificationEndpointListHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/policies/{name}"] = admin_api.NewPolicyInfo(o.context, o.AdminAPIPolicyInfoHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/profiling/start"] = admin_api.NewProfilingStart(o.context, o.AdminAPIProfilingStartHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/profiling/stop"] = admin_api.NewProfilingStop(o.context, o.AdminAPIProfilingStopHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/remote-buckets/{name}"] = user_api.NewRemoteBucketDetails(o.context, o.UserAPIRemoteBucketDetailsHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/groups/{name}"] = admin_api.NewRemoveGroup(o.context, o.AdminAPIRemoveGroupHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/policies/{name}"] = admin_api.NewRemovePolicy(o.context, o.AdminAPIRemovePolicyHandler)
|
|
if o.handlers["DELETE"] == nil {
|
|
o.handlers["DELETE"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["DELETE"]["/users/{name}"] = admin_api.NewRemoveUser(o.context, o.AdminAPIRemoveUserHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/service/restart"] = admin_api.NewRestartService(o.context, o.AdminAPIRestartServiceHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/session"] = user_api.NewSessionCheck(o.context, o.UserAPISessionCheckHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/buckets/{name}/quota"] = user_api.NewSetBucketQuota(o.context, o.UserAPISetBucketQuotaHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/buckets/{bucket_name}/versioning"] = user_api.NewSetBucketVersioning(o.context, o.UserAPISetBucketVersioningHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/configs/{name}"] = admin_api.NewSetConfig(o.context, o.AdminAPISetConfigHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/set-policy/{name}"] = admin_api.NewSetPolicy(o.context, o.AdminAPISetPolicyHandler)
|
|
if o.handlers["POST"] == nil {
|
|
o.handlers["POST"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["POST"]["/namespaces/{namespace}/tenants/{tenant}/zones"] = admin_api.NewTenantAddZone(o.context, o.AdminAPITenantAddZoneHandler)
|
|
if o.handlers["GET"] == nil {
|
|
o.handlers["GET"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["GET"]["/namespaces/{namespace}/tenants/{tenant}"] = admin_api.NewTenantInfo(o.context, o.AdminAPITenantInfoHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/namespaces/{namespace}/tenants/{tenant}/certificates"] = admin_api.NewTenantUpdateCertificate(o.context, o.AdminAPITenantUpdateCertificateHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/namespaces/{namespace}/tenants/{tenant}/encryption"] = admin_api.NewTenantUpdateEncryption(o.context, o.AdminAPITenantUpdateEncryptionHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/namespaces/{namespace}/tenants/{tenant}/zones"] = admin_api.NewTenantUpdateZones(o.context, o.AdminAPITenantUpdateZonesHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/groups/{name}"] = admin_api.NewUpdateGroup(o.context, o.AdminAPIUpdateGroupHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/namespaces/{namespace}/tenants/{tenant}"] = admin_api.NewUpdateTenant(o.context, o.AdminAPIUpdateTenantHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/users/{name}/groups"] = admin_api.NewUpdateUserGroups(o.context, o.AdminAPIUpdateUserGroupsHandler)
|
|
if o.handlers["PUT"] == nil {
|
|
o.handlers["PUT"] = make(map[string]http.Handler)
|
|
}
|
|
o.handlers["PUT"]["/users/{name}"] = admin_api.NewUpdateUserInfo(o.context, o.AdminAPIUpdateUserInfoHandler)
|
|
}
|
|
|
|
// Serve creates a http handler to serve the API over HTTP
|
|
// can be used directly in http.ListenAndServe(":8000", api.Serve(nil))
|
|
func (o *ConsoleAPI) Serve(builder middleware.Builder) http.Handler {
|
|
o.Init()
|
|
|
|
if o.Middleware != nil {
|
|
return o.Middleware(builder)
|
|
}
|
|
return o.context.APIHandler(builder)
|
|
}
|
|
|
|
// Init allows you to just initialize the handler cache, you can then recompose the middleware as you see fit
|
|
func (o *ConsoleAPI) Init() {
|
|
if len(o.handlers) == 0 {
|
|
o.initHandlerCache()
|
|
}
|
|
}
|
|
|
|
// RegisterConsumer allows you to add (or override) a consumer for a media type.
|
|
func (o *ConsoleAPI) RegisterConsumer(mediaType string, consumer runtime.Consumer) {
|
|
o.customConsumers[mediaType] = consumer
|
|
}
|
|
|
|
// RegisterProducer allows you to add (or override) a producer for a media type.
|
|
func (o *ConsoleAPI) RegisterProducer(mediaType string, producer runtime.Producer) {
|
|
o.customProducers[mediaType] = producer
|
|
}
|
|
|
|
// AddMiddlewareFor adds a http middleware to existing handler
|
|
func (o *ConsoleAPI) AddMiddlewareFor(method, path string, builder middleware.Builder) {
|
|
um := strings.ToUpper(method)
|
|
if path == "/" {
|
|
path = ""
|
|
}
|
|
o.Init()
|
|
if h, ok := o.handlers[um][path]; ok {
|
|
o.handlers[method][path] = builder(h)
|
|
}
|
|
}
|